264 resultados para 128.1
Resumo:
β-Adrenoceptor blocking agents (β-blockers) that at low concentrations antagonize cardiostimulant effects of catecholamines, but at high concentrations also cause cardiostimulation, have been appearing since the late 1960s. These cardiostimulant β-blockers, coined non-conventional partial agonists, antagonize the effects of catecholamines through a high-affinity site (β1HAR), but cause cardiostimulation mainly through a low-affinity site (β1LAR) of the myocardial β1-adrenoceptor. The experimental non-conventional partial agonist (−)-CGP12177 increases cardiac L-type Ca2+ current density and Ca2+ transients, shortens action potential duration but augments action potential plateau, increases heart rate and force, as well as causes arrhythmic Ca2+ transients and arrhythmic cardiocyte contractions. Other β-blockers, which do not cause cardiostimulation, consistently have lower affinity for β1LAR than β1HAR. These sites were verified and the cardiac pharmacology of non-conventional partial agonists confirmed on recombinant β1-adrenoceptors and on β1-adrenoceptors overexpressed into the heart. A targeted mutation of Asp138 to Glu138 virtually abolished the pharmacology of β1HAR but left intact the pharmacology of β1LAR. Non-conventional partial agonists may be beneficial for the treatment of peripheral autonomic neuropathy but probably due to their arrhythmic propensities, may be harmful for the treatment of chronic heart failure.
Resumo:
This work reviews the rationale and processes for raising revenue and allocating funds to perform information intensive activities that are pertinent to the work of democratic government. ‘Government of the people, by the people, for the people’ expresses an idea that democratic government has no higher authority than the people who agree to be bound by its rules. Democracy depends on continually learning how to develop understandings and agreements that can sustain voting majorities on which democratic law making and collective action depends. The objective expressed in constitutional terms is to deliver ‘peace, order and good government’. Meeting this objective requires a collective intellectual authority that can understand what is possible; and a collective moral authority to understand what ought to happen in practice. Facts of life determine that a society needs to retain its collective competence despite a continual turnover of its membership as people die but life goes on. Retaining this ‘collective competence’ in matters of self-government depends on each new generation: • acquiring a collective knowledge of how to produce goods and services needed to sustain a society and its capacity for self-government; • Learning how to defend society diplomatically and militarily in relation to external forces to prevent overthrow of its self-governing capacity; and • Learning how to defend society against divisive internal forces to preserve the authority of representative legislatures, allow peaceful dispute resolution and maintain social cohesion.
Resumo:
The draft Year 1 Literacy and Numeracy Checkpoints Assessments were in open and supported trial during Semester 2, 2010. The purpose of these trials was to evaluate the Year 1 Literacy and Numeracy Checkpoints Assessments (hereafter the Year 1 Checkpoints) that were designed in 2009 as a way to incorporate the use of the Year 1 Literacy and Numeracy Indicators as formative assessment in Year 1 in Queensland Schools. In these trials there were no mandated reporting requirements. The processes of assessment were related to future teaching decisions. As such the trials were trials of materials and the processes of using those materials to assess students, plan and teach in year 1 classrooms. In their current form the Year 1 Checkpoints provide assessment resources for teachers to use in February, June and October. They aim to support teachers in monitoring children's progress and making judgments about their achievement of the targeted P‐3 Literacy and Numeracy Indicators by the end of Year 1 (Queensland Studies Authority, 2010 p. 1). The Year 1 Checkpoints include support materials for teachers and administrators, an introductory statement on assessment, work samples, and a Data Analysis Assessment Record (DAAR) to record student performance. The Supported Trial participants were also supported with face‐to‐face and on‐line training sessions, involvement in a moderation process after the October Assessments, opportunities to participate in discussion forums as well as additional readings and materials. The assessment resources aim to use effective early years assessment practices in that the evidence is gathered from hands‐on teaching and learning experiences, rather than more formal assessment methods. They are based in a model of assessment for learning, and aim to support teachers in the “on‐going process of determining future learning directions” (Queensland Studies Authority, 2010 p. 1) for all students. Their aim is to focus teachers on interpreting and analysing evidence to make informed judgments about the achievement of all students, as a way to support subsequent planning for learning and teaching. The Evaluation of the Year 1 Literacy and Numeracy Checkpoints Assessments Supported Trial (hereafter the Evaluation) aimed to gather information about the appropriateness, effectiveness and utility of the Year 1 Checkpoints Assessments from early years’ teachers and leaders in up to one hundred Education Queensland schools who had volunteered to be part of the Supported Trial. These sample schools represent schools across a variety of Education Queensland regions and include schools with: - A high Indigenous student population; - Urban, rural and remote school locations; - Single and multi‐age early phase classes; - A high proportion of students from low SES backgrounds. The purpose of the Evaluation was to: Evaluate the materials and report on the views of school‐based staff involved in the trial on the process, materials, and assessment practices utilised. The Evaluation has reviewed the materials, and used surveys, interviews, and observations of processes and procedures to collect relevant data to help present an informed opinion on the Year 1 Checkpoints as assessment for the early years of schooling. Student work samples and teacher planning and assessment documents were also collected. The evaluation has not evaluated the Year 1 Checkpoints in any other capacity than as a resource for Year 1 teachers and relevant support staff.
Resumo:
This paper investigated the phenomenon of prejudice among ISD project members. We presented a theoretical discussion followed by one qualitative and one quantitative study. In the qualitative study, we interviewed different members of the project teams to understand the different types of prejudice possessed by team members. Results of this interview study led to the development of prejudice scales for IT members and users, which was used in the quantitative study. We surveyed 128 ISD teams and found that prejudice was related task and relationship conflict, satisfaction and willingness to work together in the future. Furthermore, prejudice exerts stronger influences on users than IT members in terms of increasing task and relationship conflicts and decreasing goal commitment.
Resumo:
In the structure of the title salt, C12H12N3+ C6H2N3O7-, the diazenyl group of the 4-(phenyldiazenyl)aniline molecule is protonated and forms a hydrogen bond with the phenolate O acceptor of the picrate anion. Structure extension occurs through two symmetrical inter-ion three-centre amine N---H...O,O'(nitro) hydrogen-bonding associations [graph set R2/1(4)] giving a convoluted two-dimensional network structure.
Resumo:
This is the first article in a series of three that examines the legal role of medical professionals in decisions to withhold or withdraw life-sustaining treatment from adults who lack capacity. This article considers the position in New South Wales. A review of the law in this State reveals that medical professionals play significant legal roles in these decisions. However, the law is problematic in a number of respects and this is likely to impede medical professionals’ legal knowledge in this area. The article examines the level of training medical professionals receive on issues such as advance directives and substitute decision-making, and the available empirical evidence as to the state of medical professionals’ knowledge of the law at the end of life. It concludes that there are gaps in legal knowledge and that law reform is needed in New South Wales.
Resumo:
[Selection of papers from the Older Road User Safety Symposium, 26 November 2000, Brisbane, Australia.]----- This publication is a selection of papers on older road user safety which were presented at the Older Road User Safety Symposium on Sunday 26 November 2000 at the Sheraton Brisbane Hotel, Queensland, Australia. The Symposium was held on the day before Australia’s annual Road Safety Research, Policing and Education Conference, which provided an opportunity to garner both presenters and participants from the wider road safety community in Australia. Road safety is a large and diverse area of scholarship and practice, and many disciplines are drawn on in the processes of understanding and addressing road safety problems. The safety of older road users is no different. As this selection shows, work on older road user safety can be informed by demography, research on the mental and physical effects of ageing, social research on older people as road users, evaluation of educational and behavioural interventions, road crash analysis, engineering research and practice, and reviews of policy approaches within Australia and elsewhere. It is possible to summarise these into four constellations, which are reflected in the papers selected for this publication: social impacts and responses; physical and cognitive capability; specific road use performance; and environment/ecology. Though three years have passed since the Symposium, the issues raised in these papers remain current.
Resumo:
Injury is the leading cause of death among adolescents, and in many countries, accounts for more deaths than all other causes combined. Rates of death due to injury also increase dramatically across adolescence. The Australian Institute of Health and Welfare reported that, in 2005, there were 954 deaths of young Australians due to injury, which is a rate of 26 deaths per 100,000 young people. Of these deaths, 4% were adolescents aged 12-14, 17% were aged 15-17, and 80% were aged 18-24 years. Issues addressed: Injuries are the leading cause of death among adolescents. The current research examined a measure of adolescent injury in terms of whether it encompasses the diverse injury experiences of Australian adolescents, including high-risk and normative adolescents, and thus determine its utility as a tool for health promotion research. Grade 9 students from two Brisbane high schools (n=202, aged 13-14 years) and adolescents recruited from the Emergency Department waiting rooms of four Brisbane hospitals (n=98, aged 16-18 years) completed the Extended Adolescent Injury Checklist (E-AIC). The most common cause of injury among adolescents was a sports activity, followed by fights for all participants except schoolbased males, who experienced more bicycle injuries. Alcohol use was most frequently reported in association with interpersonal violence injuries. A broad variety of injuries, occurring in context of multiple risk as well as normative behaviours, were reported by adolescents in both school and ED settings, and were captured by the E-AIC. Findings suggest that the E-AIC is a useful measure that captures the injury experiences of adolescents in different contexts. The high occurrence of injuries that do not result in formal medical treatment also indicates scope for interventions to be based around lessons in first aid, while also incorporating injury prevention components.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Sonic Loom is a purpose built classroom tool for teachers and students of drama that will enable them to explore the use of music in live performance in theory and practice. It’s intended as a resource for drama classrooms, to encourage communication and exchange about the way music works on us so we can find new ways we can make it work for us. Working to consciously attend to music and how it’s used, particularly in cinema (as a popular way in to styles of western theatre and live performance) will allow students and teachers to use music in more subtle and complex ways an aid to narrative in performance. Sonic Loom encourages active listening, (aided but not encumbered by traditional musicology) so students (and teachers) can develop a ‘critical ear’ in the transformation and adaptation of music for their own artistic purposes, whether it’s soundtracking existing scene work, or acting as a pre-text for scenes which have yet to be created.
Resumo:
Analyzing security protocols is an ongoing research in the last years. Different types of tools are developed to make the analysis process more precise, fast and easy. These tools consider security protocols as black boxes that can not easily be composed. It is difficult or impossible to do a low-level analysis or combine different tools with each other using these tools. This research uses Coloured Petri Nets (CPN) to analyze OSAP trusted computing protocol. The OSAP protocol is modeled in different levels and it is analyzed using state space method. The produced model can be combined with other trusted computing protocols in future works.